"For example, an authentication system may use facial recognition to determine whether the individual should be allowed to enter various secured locations or resources, such as computer files, programs, etc." . . . . .